Sciweavers

210 search results - page 25 / 42
» Secure Java Development with UML
Sort
View
CASES
2009
ACM
14 years 2 months ago
Automatic detection of fault attack and countermeasures
Security of smart cards is continuously threatened by many software and hardware attacks. Those attacks focus on giving secret information that are stored in the card like PIN cod...
Ahmadou A. Sere, Julien Iguchi-Cartigny, Jean-Loui...
SC
2000
ACM
14 years 2 months ago
An Object-Oriented Job Execution Environment
This is a project for developing a distributed job execution environment for highly iterative jobs. An iterative job is one where the same binary code is run hundreds of times wit...
Lance Smith, Rod Fatoohi
CCS
2009
ACM
14 years 4 months ago
Ripley: automatically securing web 2.0 applications through replicated execution
Rich Internet applications are becoming increasingly distributed, as demonstrated by the popularity of AJAX or Web 2.0 applications such as Facebook, Google Maps, Hotmail and many...
K. Vikram, Abhishek Prateek, V. Benjamin Livshits
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
14 years 1 months ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly
ACSAC
2004
IEEE
14 years 1 months ago
Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets
We have developed a mechanism which prevents abuse of trusted Java applets, such as digitally signed applets. A signed applet is usually permitted by a user to perform certain fun...
Hisashi Kojima, Ikuya Morikawa, Yuko Nakayama, Yuj...